US20170109048A1 - Memory unit with data segment information in header - Google Patents
Memory unit with data segment information in header Download PDFInfo
- Publication number
- US20170109048A1 US20170109048A1 US15/128,476 US201415128476A US2017109048A1 US 20170109048 A1 US20170109048 A1 US 20170109048A1 US 201415128476 A US201415128476 A US 201415128476A US 2017109048 A1 US2017109048 A1 US 2017109048A1
- Authority
- US
- United States
- Prior art keywords
- data segment
- data
- unit
- header
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
- G06F12/0238—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory
- G06F12/0246—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory in block erasable memory, e.g. flash memory
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1004—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/72—Details relating to flash memory management
- G06F2212/7206—Reconfiguration of flash memory system
Definitions
- Hardware components used in various applications may be provided with a memory device with data identifying the component.
- a component may include an electrically erasable programmable read-only memory (EEPROM) which includes data identifying the product name, serial number and/or other data related to the component.
- EEPROM electrically erasable programmable read-only memory
- FIG. 1 illustrates an example device with an example memory unit
- FIG. 2 illustrates a structure of an example memory area
- FIG. 3 illustrates a structure for an example unit header
- FIG. 4 illustrates a structure for an example data segment
- FIG. 5 illustrates example process performed in reading the example memory area.
- certain devices may include an electrically erasable programmable read-only memory (EEPROM) which includes data identifying the product name, serial number and/or other data related to the component.
- EEPROM electrically erasable programmable read-only memory
- various field replaceable units FRUs
- Such FRUs may include servers, interconnects, power supplies, fans, and other components that may be part of, for example, a blade enclosure system.
- An example blade enclosure system may include an onboard administrator module that manages the system and may control various components and FRUs.
- the example onboard administrator may identify each FRU using information included in the EEPROM of the FRU.
- the EEPROM (or other memory provided in the FRU) may be provided with a data structure that allows the EEPROM to have an arbitrary number of data components, each having an arbitrary length.
- the EEPROM may be provided with a data structure that is extensible to any number of application and/or environments.
- FIG. 1 is a block diagram of an example device 100 ,
- the example device 100 may be any type of component, such as an FRU in a blade enclosure system, for example.
- the example device 100 may be a blade bay, a blade system midplane, a fan, a power supply, or any of a number of other components of the blade enclosure system.
- the example device 100 may be removable and/or replaceable with a similar or different device within the blade enclosure system.
- the device 100 may be provided with one or move device components 110 .
- the device 100 may include device components 110 such as a fan motor, for example.
- the present disclosure describes the device 100 as an FRU, those skilled in the art will appreciate that, in various examples, the device 100 may be any of a variety of devices or components.
- a device such as a blade enclosure may have numerous device components.
- Each device component 110 of the example device 100 is provided with a memory unit 120 , such as an electronically erasable programmable read-only memory (EEPROM).
- the memory unit 120 contains data which may be used to identify the device 100 or the device component 110 .
- an onboard administrator may communicate with the device 100 , which may be an FRU such as a power supply or a fan. The onboard administrator may access the memory unit 120 and read the data to identify the device 100 or the device component 110 .
- the memory unit 120 is provided with a memory area 200 which is structured to facilitate reading of the memory unit 120 by, for example, the onboard administrator.
- a memory area 200 which is structured to facilitate reading of the memory unit 120 by, for example, the onboard administrator.
- an example memory area 200 has a structure which allows for the memory unit 120 to contain data in an arbitrary number of data segments, each having an arbitrary length.
- the structure of the example memory area 200 may be extensible to a variety of current and future protocol s and environments.
- the structure of the example memory area 200 includes a unit header 210 and at least one data segment 220 a - n .
- the unit header 210 may provide information regarding the number and location of each of the data segments 220 a - n .
- the size of the memory area 200 may be of any length as long as the size is within the limits of the physical memory unit 120 .
- the memory unit 120 may contain a single memory area 200 or multiple memory areas.
- the memory unit 120 contains redundant memory areas 200 . In this regard, if a primary memory area 200 becomes corrupted or otherwise unreadable, the onboard administrator may use the redundant memory area to obtain identification information, for example.
- the total size of the unit header 210 may be arbitrary and limited only by the capability of the physical memory unit 120 to accommodate the unit header 210 and the remainder of the memory area 200 .
- the starting point of the unit header 210 may be one of a set of predefined locations. For example, in one example, the unit header 210 starts on a 256-byte boundary. Thus, when looking for the unit header 210 , the onboard administrator may look at each 256-byte boundary.
- the example unit header 210 begins with a signature value 310 .
- the signature value 310 is four bytes in length in the example of FIG. 3 .
- the signature value 310 indicates the start of the FRU Data Segment 200 memory content of, for example, a server blade within a blade enclosure.
- the example unit header 210 also includes a unit size block 320 which indicates the length of the entire memory area 200 .
- the unit size block 320 is a 4-byte block of information. In other examples, where unit sizes are expected to be smaller or greater, the unit size block 320 may be of a different size.
- a segment count block 330 in the example unit header 210 indi.ates the number of data segments 220 a - n that follow the unit header 210 , A one-byte block for the segment count block 330 is sufficient to accommodate up to 255 data segments 220 a - n . In examples where a larger number of data segments 220 a - n is expected, the segment count block 330 may be larger.
- a unit header size block 340 is provided to indicate the total length of the unit header 210 . In the example of FIG. 3 , the unit header size block 340 is two bytes in length.
- the unit header 210 includes a separate data segment offset block 350 a - n corresponding to each data segment 220 a - n which follows the unit header 210 .
- each data segment offset block 350 a - n is four bytes in length and indicates the memory location of each data segment.
- each data segment offset block 350 a - n indicates the offset, in bytes, between the start of the unit header 210 and the start of the associated data segment 220 a - n.
- a checksum block 360 is provided to include a checksum value for the entire unit header 210 .
- the checksum value may be used for purposes of error detection upon reading of the data by, for example, the onboard administrator of a blade enclosure system.
- the checksum uses a cyclical redundancy check (CRC) error detection.
- CRC cyclical redundancy check
- different types of checksum may be used.
- the length of the unit header 210 is variable.
- the length of the unit header 210 may depend on the number of data segments 220 a - n , resulting in a different number of data segment offset blocks 350 a - n .
- the length of the unit header 210 may be fixed by providing a fixed number of data segment offset blocks 350 a - n .
- the number of data segment offset blocks 350 a - n may be set to a sufficiently high number to accommodate expected scenarios.
- the value of the offset may be set to 0 to indicate unused data segment.
- the unit header 210 may be provided with 20 data segment offset blocks 350 a - n . When only 16 data segments 220 a - n are provided, the last four of the data segments offset blocks 350 a - n may contain a value of 0.
- unit header 210 may contain additional blocks for additional information.
- a data block may be provided to indicate the presence of a redundant memory area 200 and another data block indicating the location of such redundant memory area.
- the size and the location of the data segment 220 may be arbitrary and may be indicated by information in the unit header 210 .
- the data segment 220 includes a signature block 410 indicating the start of the data segment 220 .
- the length of the example signature block 410 of FIG. 4 is four bytes, but may be selected as desired for various purposes.
- a source file extension block 420 is provided to indicate the name of the source file.
- the source file name block 420 is an arbitrary size block of data indicating the source file name. Any unused bytes may be padded with 0's and may be ignored.
- a one-byte type block 430 may indicate the type of source file.
- the values of the type block 430 may indicate the type of data as follows:
- JSON JavaScript Object Notation
- .json 2 Text (.txt)
- Graphics (.jpeg, .gif, etc.)
- Diags (.diag)
- Lua (.lua)
- Scaled Vector Graphics (.svg)
- JSON JavaScript Object Notation
- .json 2 Text
- .txt 3 Graphics
- .jpeg 3 Graphics
- Diags Diags
- Lua Lua
- An additional one-byte subtype data block 440 may be provided to indicate a subtype of the data type. Subtype may also indicate whether or not the Payload block 460 has been compressed. For example, an SVG graphical payload block can be stored much more efficiently when compressed using, for example, a utility such as “GNU zip” to compress the payload bytes.
- a payload size block 450 may indicate the size of the payload block 460 which follows.
- the payload size block 450 is a 4-byte block of data which indicates the size of the payload in bytes.
- the size of the payload block 460 may be arbitrary.
- the data segment 220 may include a checksum block 470 to include a checksum value for the entire data segment 220 .
- the checksum value may be used for purposes of error detection upon reading of the data by, for example, the onboard administrator of a blade enclosure system.
- the checksum uses CRC error detection, but other examples may use different types of checksum.
- the memory area 200 may include any number of data segments 220 .
- the first data segment 220 a is the primary data segment which identifies various system components by providing information such as product name, part number, serial number, configuration settings, etc.
- the primary data segment may include content of JSON type.
- a flow chart illustrates an example process that may be performed in reading the example memory area 200 of FIGS. 2-4 .
- the example process may be executed by, for example, the onboard administrator of a blade enclosure system to identify the various components.
- the onboard administrator reads the unit header to determine information related to a data segment.
- the onboard administrator may scan possible starting points for the header. For example, as noted above, a unit header may start at a 256-byte boundary.
- the onboard administrator may determine a starting memory location and a size of the data segment.
- the unit header may include information such as the size and location (e.g., data segment offset) of each data segment. The onboard administrator may then move to the memory location corresponding to the start of the data segment (block 506 ).
- the onboard administrator may read a header portion of the data segment to determine a type and size of the data payload.
- the header portion may include the signature block 410 , the source file extension block 420 , the type block 430 , the subtype block 440 and the payload size block 450 .
- the onboard administrator may verify that the checksum value (e.g., CRC-16 checksum) in block 470 matches the computed checksum using the contents of the data payload (block 510 ). If the checksums match, the data payload is accepted as a valid source of device information, and the onboard administrator reads the data payload (block 512 ) to, for example, obtain identification information for a device or component associated with the memory area.
- the checksum value e.g., CRC-16 checksum
- a memory area may be provided that may have any arbitrary number of data segments and the data segments may be of any arbitrary size. This allows the memory area to be extensible and compatible with a variety of protocols, standards or formats.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Detection And Correction Of Errors (AREA)
Abstract
Description
- Hardware components used in various applications may be provided with a memory device with data identifying the component. For example, a component may include an electrically erasable programmable read-only memory (EEPROM) which includes data identifying the product name, serial number and/or other data related to the component.
- For a more complete understanding of various examples, reference is now made to the following descriptions taken in connection with the accompanying drawings in which:
-
FIG. 1 illustrates an example device with an example memory unit; -
FIG. 2 illustrates a structure of an example memory area; -
FIG. 3 illustrates a structure for an example unit header; -
FIG. 4 illustrates a structure for an example data segment; and -
FIG. 5 illustrates example process performed in reading the example memory area. - As described above, certain devices may include an electrically erasable programmable read-only memory (EEPROM) which includes data identifying the product name, serial number and/or other data related to the component. For examples, various field replaceable units (FRUs) may include an EEPROM with data identifying the FRU. Such FRUs may include servers, interconnects, power supplies, fans, and other components that may be part of, for example, a blade enclosure system. An example blade enclosure system may include an onboard administrator module that manages the system and may control various components and FRUs.
- In this regard, the example onboard administrator may identify each FRU using information included in the EEPROM of the FRU. In various examples described herein, the EEPROM (or other memory provided in the FRU) may be provided with a data structure that allows the EEPROM to have an arbitrary number of data components, each having an arbitrary length. Thus, the EEPROM may be provided with a data structure that is extensible to any number of application and/or environments.
-
FIG. 1 is a block diagram of anexample device 100, Theexample device 100 may be any type of component, such as an FRU in a blade enclosure system, for example. In various examples, theexample device 100 may be a blade bay, a blade system midplane, a fan, a power supply, or any of a number of other components of the blade enclosure system. Theexample device 100 may be removable and/or replaceable with a similar or different device within the blade enclosure system. - In the
example device 100 ofFIG. 1 , thedevice 100 may be provided with one or movedevice components 110. For example, in the case of a fan, thedevice 100 may includedevice components 110 such as a fan motor, for example. While the present disclosure describes thedevice 100 as an FRU, those skilled in the art will appreciate that, in various examples, thedevice 100 may be any of a variety of devices or components. For example, a device such as a blade enclosure may have numerous device components. - Each
device component 110 of theexample device 100 is provided with amemory unit 120, such as an electronically erasable programmable read-only memory (EEPROM). In various examples, thememory unit 120 contains data which may be used to identify thedevice 100 or thedevice component 110. For example, in a blade enclosure system, an onboard administrator may communicate with thedevice 100, which may be an FRU such as a power supply or a fan. The onboard administrator may access thememory unit 120 and read the data to identify thedevice 100 or thedevice component 110. - The
memory unit 120 is provided with amemory area 200 which is structured to facilitate reading of thememory unit 120 by, for example, the onboard administrator. As described below, anexample memory area 200 has a structure which allows for thememory unit 120 to contain data in an arbitrary number of data segments, each having an arbitrary length. Thus, the structure of theexample memory area 200 may be extensible to a variety of current and future protocol s and environments. - Referring now to
FIG. 2 , anexample memory area 200 is illustrated. The structure of theexample memory area 200 includes aunit header 210 and at least onedata segment 220 a-n. Theunit header 210 may provide information regarding the number and location of each of thedata segments 220 a-n. In various examples, the size of thememory area 200 may be of any length as long as the size is within the limits of thephysical memory unit 120. Further, thememory unit 120 may contain asingle memory area 200 or multiple memory areas. In one example, thememory unit 120 containsredundant memory areas 200. In this regard, if aprimary memory area 200 becomes corrupted or otherwise unreadable, the onboard administrator may use the redundant memory area to obtain identification information, for example. - Referring now to
FIG. 3 , anexample unit header 210 is illustrated. In various examples, the total size of theunit header 210 may be arbitrary and limited only by the capability of thephysical memory unit 120 to accommodate theunit header 210 and the remainder of thememory area 200. The starting point of theunit header 210 may be one of a set of predefined locations. For example, in one example, theunit header 210 starts on a 256-byte boundary. Thus, when looking for theunit header 210, the onboard administrator may look at each 256-byte boundary. - In the example of
FIG. 3 , theexample unit header 210 begins with asignature value 310. Thesignature value 310 is four bytes in length in the example ofFIG. 3 . Thesignature value 310 indicates the start of the FRUData Segment 200 memory content of, for example, a server blade within a blade enclosure. Theexample unit header 210 also includes aunit size block 320 which indicates the length of theentire memory area 200. In the example ofFIG. 3 , theunit size block 320 is a 4-byte block of information. In other examples, where unit sizes are expected to be smaller or greater, theunit size block 320 may be of a different size. - A
segment count block 330 in theexample unit header 210 indi.ates the number ofdata segments 220 a-n that follow theunit header 210, A one-byte block for thesegment count block 330 is sufficient to accommodate up to 255data segments 220 a-n. In examples where a larger number ofdata segments 220 a-n is expected, thesegment count block 330 may be larger. A unitheader size block 340 is provided to indicate the total length of theunit header 210. In the example ofFIG. 3 , the unitheader size block 340 is two bytes in length. - The
unit header 210 includes a separate data segment offset block 350 a-ncorresponding to eachdata segment 220 a-n which follows theunit header 210. In the example ofFIG. 3 , each data segment offset block 350 a-n is four bytes in length and indicates the memory location of each data segment. In one example, each data segment offset block 350 a-n indicates the offset, in bytes, between the start of theunit header 210 and the start of the associateddata segment 220 a-n. - In the example of
FIG. 3 , achecksum block 360 is provided to include a checksum value for theentire unit header 210. The checksum value may be used for purposes of error detection upon reading of the data by, for example, the onboard administrator of a blade enclosure system. In various examples, the checksum uses a cyclical redundancy check (CRC) error detection. Of course, in other examples, different types of checksum may be used. - In the example of
FIG. 3 , the length of theunit header 210 is variable. For example, the length of theunit header 210 may depend on the number ofdata segments 220 a-n, resulting in a different number of data segment offset blocks 350 a-n. In other examples, the length of theunit header 210 may be fixed by providing a fixed number of data segment offset blocks 350 a-n. In this regard, the number of data segment offset blocks 350 a-n may be set to a sufficiently high number to accommodate expected scenarios. For unused data segment offset blocks, the value of the offset may be set to 0 to indicate unused data segment. For example, theunit header 210 may be provided with 20 data segment offset blocks 350 a-n. When only 16data segments 220 a-n are provided, the last four of the data segments offset blocks 350 a-n may contain a value of 0. - Of course, those skilled in the art will appreciate that the
unit header 210 may contain additional blocks for additional information. For example, a data block may be provided to indicate the presence of aredundant memory area 200 and another data block indicating the location of such redundant memory area. - Referring now to
FIG. 4 , anexample data segment 220 is illustrated. As noted above, the size and the location of thedata segment 220 may be arbitrary and may be indicated by information in theunit header 210. In the example ofFIG. 4 , thedata segment 220 includes asignature block 410 indicating the start of thedata segment 220. The length of the example signature block 410 ofFIG. 4 is four bytes, but may be selected as desired for various purposes. A sourcefile extension block 420 is provided to indicate the name of the source file. In various examples, the sourcefile name block 420 is an arbitrary size block of data indicating the source file name. Any unused bytes may be padded with 0's and may be ignored. - A one-
byte type block 430 may indicate the type of source file. In various examples, the values of thetype block 430 may indicate the type of data as follows: -
1 JavaScript Object Notation (JSON) (.json) 2 Text (.txt) 3 Graphics (.jpeg, .gif, etc.) 4 Diags (.diag) 5 Lua (.lua) 6 Scaled Vector Graphics (.svg) Other May be reserved for future use - An additional one-byte subtype data block 440 may be provided to indicate a subtype of the data type. Subtype may also indicate whether or not the
Payload block 460 has been compressed. For example, an SVG graphical payload block can be stored much more efficiently when compressed using, for example, a utility such as “GNU zip” to compress the payload bytes. - A
payload size block 450 may indicate the size of thepayload block 460 which follows. In the example ofFIG. 4 , thepayload size block 450 is a 4-byte block of data which indicates the size of the payload in bytes. As indicated above, the size of thepayload block 460 may be arbitrary. - As with the
unit header 210, thedata segment 220 may include achecksum block 470 to include a checksum value for theentire data segment 220. The checksum value may be used for purposes of error detection upon reading of the data by, for example, the onboard administrator of a blade enclosure system. In the example ofFIG. 4 , the checksum uses CRC error detection, but other examples may use different types of checksum. - As noted above, in various examples, the
memory area 200 may include any number ofdata segments 220. In one example, thefirst data segment 220 a is the primary data segment which identifies various system components by providing information such as product name, part number, serial number, configuration settings, etc. The primary data segment may include content of JSON type. - Referring now to
FIG. 5 , a flow chart illustrates an example process that may be performed in reading theexample memory area 200 ofFIGS. 2-4 . The example process may be executed by, for example, the onboard administrator of a blade enclosure system to identify the various components. Atblock 502, the onboard administrator reads the unit header to determine information related to a data segment. In this regard, the onboard administrator may scan possible starting points for the header. For example, as noted above, a unit header may start at a 256-byte boundary. - At
block 504, the onboard administrator may determine a starting memory location and a size of the data segment. As described above with reference toFIG. 3 , the unit header may include information such as the size and location (e.g., data segment offset) of each data segment. The onboard administrator may then move to the memory location corresponding to the start of the data segment (block 506). - At
block 508, the onboard administrator may read a header portion of the data segment to determine a type and size of the data payload. In the example ofFIG. 4 , the header portion may include thesignature block 410, the sourcefile extension block 420, thetype block 430, thesubtype block 440 and thepayload size block 450. The onboard administrator may verify that the checksum value (e.g., CRC-16 checksum) inblock 470 matches the computed checksum using the contents of the data payload (block 510). If the checksums match, the data payload is accepted as a valid source of device information, and the onboard administrator reads the data payload (block 512) to, for example, obtain identification information for a device or component associated with the memory area. - Thus, in accordance with the various examples described herein, a memory area may be provided that may have any arbitrary number of data segments and the data segments may be of any arbitrary size. This allows the memory area to be extensible and compatible with a variety of protocols, standards or formats.
- The various examples set forth herein are described in terms of example block diagrams, flow charts and other illustrations. Those skilled in the art will appreciate that the illustrated examples and their various alternatives can be implemented without confinement to the illustrated examples. For example, block diagrams and their accompanying description should not be construed as mandating a particular architecture or configuration.
Claims (15)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2014/032332 WO2015152867A1 (en) | 2014-03-31 | 2014-03-31 | Memory unit with data segment information in header |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20170109048A1 true US20170109048A1 (en) | 2017-04-20 |
Family
ID=54241000
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/128,476 Abandoned US20170109048A1 (en) | 2014-03-31 | 2014-03-31 | Memory unit with data segment information in header |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US20170109048A1 (en) |
| WO (1) | WO2015152867A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11403043B2 (en) * | 2019-10-15 | 2022-08-02 | Pure Storage, Inc. | Efficient data compression by grouping similar data within a data segment |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110280261A1 (en) * | 2010-05-11 | 2011-11-17 | Texas Instruments Incorporated | Interleaver Design and Header Structure For ITU G.hnem |
| US20130138905A1 (en) * | 2002-08-29 | 2013-05-30 | Micron Technology, Inc. | Managing memory data recovery upon power loss |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6338150B1 (en) * | 1997-05-13 | 2002-01-08 | Micron Technology, Inc. | Diagnostic and managing distributed processor system |
| US6925540B2 (en) * | 2002-05-02 | 2005-08-02 | Intel Corporation | Systems and methods for chassis identification |
| US7401221B2 (en) * | 2002-09-04 | 2008-07-15 | Microsoft Corporation | Advanced stream format (ASF) data stream header object protection |
-
2014
- 2014-03-31 US US15/128,476 patent/US20170109048A1/en not_active Abandoned
- 2014-03-31 WO PCT/US2014/032332 patent/WO2015152867A1/en active Application Filing
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130138905A1 (en) * | 2002-08-29 | 2013-05-30 | Micron Technology, Inc. | Managing memory data recovery upon power loss |
| US20110280261A1 (en) * | 2010-05-11 | 2011-11-17 | Texas Instruments Incorporated | Interleaver Design and Header Structure For ITU G.hnem |
Non-Patent Citations (1)
| Title |
|---|
| INTEL CORPORATION et a!., 'Platform Management FRU Information Storage Definition'. Revision 1.2, 02/28/2013, See pg 1. ! ines 2-39, pg 2. I ines 1-1, pg 3, lines 1-47, pg 6, table 8-1, pg 14, line i-6, 36 Pgs. (cited on applicant's IDS filed 9/23/2016 and provided by applicant) * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11403043B2 (en) * | 2019-10-15 | 2022-08-02 | Pure Storage, Inc. | Efficient data compression by grouping similar data within a data segment |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2015152867A1 (en) | 2015-10-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9916270B2 (en) | Virtual intelligent platform management interface (IPMI) satellite controller and method | |
| CN104391727B (en) | Data programming method, system, burn writing equipment and target device | |
| US10387652B2 (en) | Firmware map data | |
| US20160191678A1 (en) | Technologies for data integrity of multi-network packet operations | |
| CN107113324B (en) | Data backup device, method and system | |
| US20200133774A1 (en) | Method, device and program product for managing data of raid | |
| CN112416891B (en) | Data detection method, device, electronic equipment and readable storage medium | |
| US20170149451A1 (en) | Method of similarity testing by syndromes and apparatus therefore | |
| CN108647131B (en) | The output system of the operation log | |
| CN112839003A (en) | Data verification method and system | |
| CN116185512B (en) | Drive loading method, device, equipment and medium for PTC driver | |
| US20200042422A1 (en) | Log analysis method, system, and storage medium | |
| EP2615551A1 (en) | Abnormality inspection device, central processing unit, and abnormality inspection method | |
| US20190045030A1 (en) | Security-oriented compression | |
| CN105897689B (en) | Embedded system and method thereof | |
| CN107861833A (en) | The generation method and device of identification code, computer equipment, readable storage medium storing program for executing | |
| DE102007061414A1 (en) | Electronic device, firmware download system and firmware update process | |
| US20170085432A1 (en) | Method and apparatus for determining a physical position of a device | |
| US20170109048A1 (en) | Memory unit with data segment information in header | |
| CN107957923B (en) | A memory diagnostic method and device | |
| WO2020219485A1 (en) | Operating method of self-service terminal and self-service terminal | |
| CN110020565B (en) | Probe information reading fault prompting method, device, server and storage medium | |
| CN108965463B (en) | File transmission method, device and system | |
| CN110968255B (en) | Data processing method, device, storage medium and processor | |
| US9325346B1 (en) | Systems and methods for handling parity and forwarded error in bus width conversion |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BRINKMEYER, JAY CHARLES;REEL/FRAME:039839/0105 Effective date: 20140331 Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:040126/0001 Effective date: 20151027 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |